Cybercrime and Technology in Investigations

Expert-defined terms from the Professional Certificate in Leadership for Detective Commander of Serious Commercial Crime Investigation course at London School of Planning and Management. Free to read, free to share, paired with a globally recognised certification pathway.

Cybercrime and Technology in Investigations

Cybercrime #

Cybercrime

Cybercrime refers to criminal activities carried out using computers and the int… #

These crimes can range from hacking and identity theft to online scams and cyberbullying. Cybercrime poses a significant threat to individuals, businesses, and governments worldwide.

- Cybersecurity: The practice of protecting systems, networks, and data from cyb… #

- Cybersecurity: The practice of protecting systems, networks, and data from cyber threats.

- Malware: Malicious software designed to disrupt, damage, or gain unauthorized… #

- Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

- Phishing: A type of cyber attack where attackers impersonate legitimate entiti… #

- Phishing: A type of cyber attack where attackers impersonate legitimate entities to steal sensitive information such as passwords and credit card details.

Technology in Investigations #

Technology in Investigations

Technology plays a crucial role in modern investigations, providing law enforcem… #

From digital forensics to surveillance equipment, technology has revolutionized the way investigations are conducted.

- Digital Forensics: The process of collecting, preserving, analyzing, and prese… #

- Digital Forensics: The process of collecting, preserving, analyzing, and presenting digital evidence in court.

- Surveillance: The monitoring of activities, behavior, or information for the p… #

- Surveillance: The monitoring of activities, behavior, or information for the purpose of gathering evidence.

- Data Analytics: The use of algorithms and software to analyze large datasets a… #

- Data Analytics: The use of algorithms and software to analyze large datasets and extract useful information.

Algorithm #

Algorithm

An algorithm is a set of instructions or rules designed to solve a specific prob… #

In the context of investigations, algorithms can be used to analyze data, identify patterns, and predict outcomes.

- Machine Learning: A subset of artificial intelligence that enables computers t… #

- Machine Learning: A subset of artificial intelligence that enables computers to learn from data and make predictions without being explicitly programmed.

- Encryption: The process of encoding information in such a way that only author… #

- Encryption: The process of encoding information in such a way that only authorized parties can access it.

- Data Mining: The process of discovering patterns in large datasets using vario… #

- Data Mining: The process of discovering patterns in large datasets using various techniques such as machine learning and statistical analysis.

Artificial Intelligence (AI) #

Artificial Intelligence (AI)

Artificial intelligence refers to the simulation of human intelligence in machin… #

In investigations, AI can be used to automate tasks, analyze data, and make decisions.

- Neural Networks: A type of AI model inspired by the human brain that can learn… #

- Neural Networks: A type of AI model inspired by the human brain that can learn and adapt to complex patterns in data.

- Natural Language Processing (NLP): A branch of AI that focuses on enabling com… #

- Natural Language Processing (NLP): A branch of AI that focuses on enabling computers to understand, interpret, and generate human language.

- Robotics: The design and creation of robots to perform tasks autonomously or w… #

- Robotics: The design and creation of robots to perform tasks autonomously or with human assistance.

Biometrics #

Biometrics

Biometrics is the measurement and analysis of unique physical or behavioral char… #

In investigations, biometrics can be used for identification, authentication, and access control.

- Biometric Authentication: The process of verifying an individual's identity ba… #

- Biometric Authentication: The process of verifying an individual's identity based on biometric data.

- Retina Scan: A biometric technique that uses unique patterns in the retina of… #

- Retina Scan: A biometric technique that uses unique patterns in the retina of the eye for identification.

- Behavioral Biometrics: The analysis of patterns in an individual's behavior, s… #

- Behavioral Biometrics: The analysis of patterns in an individual's behavior, such as typing speed or mouse movements, for authentication purposes.

Blockchain #

Blockchain

Blockchain is a decentralized, distributed ledger technology that records transa… #

In investigations, blockchain can be used to verify the authenticity of digital evidence and ensure its integrity.

- Cryptocurrency: Digital or virtual currencies that use cryptography for securi… #

- Cryptocurrency: Digital or virtual currencies that use cryptography for security and operate independently of a central authority.

- Smart Contracts: Self-executing contracts with the terms of the agreement dire… #

- Smart Contracts: Self-executing contracts with the terms of the agreement directly written into code on a blockchain.

- Decentralized Autonomous Organization (DAO): An organization governed by rules… #

- Decentralized Autonomous Organization (DAO): An organization governed by rules encoded as smart contracts on a blockchain.

Cloud Computing #

Cloud Computing

Cloud computing refers to the delivery of computing services, including storage,… #

In investigations, cloud computing enables law enforcement agencies to access and analyze large amounts of data remotely.

- Infrastructure as a Service (IaaS): A cloud computing model that provides virt… #

- Infrastructure as a Service (IaaS): A cloud computing model that provides virtualized computing resources over the internet.

- Platform as a Service (PaaS): A cloud computing model that provides a platform… #

- Platform as a Service (PaaS): A cloud computing model that provides a platform for developers to build, deploy, and manage applications.

- Software as a Service (SaaS): A cloud computing model that delivers software a… #

- Software as a Service (SaaS): A cloud computing model that delivers software applications over the internet on a subscription basis.

Cybersecurity #

Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and data from cyb… #

In investigations, cybersecurity plays a critical role in securing digital evidence and preventing data breaches.

- Firewall: A network security system that monitors and controls incoming and ou… #

- Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

- Intrusion Detection System (IDS): A security tool that monitors network or sys… #

- Intrusion Detection System (IDS): A security tool that monitors network or system activities for malicious activities or policy violations.

- Penetration Testing: The practice of testing a computer system, network, or we… #

- Penetration Testing: The practice of testing a computer system, network, or web application to identify vulnerabilities that could be exploited by attackers.

Data Analytics #

Data Analytics

Data analytics is the process of examining large datasets to uncover hidden patt… #

In investigations, data analytics can be used to analyze digital evidence and identify trends.

- Predictive Analytics: The use of statistical algorithms and machine learning t… #

- Predictive Analytics: The use of statistical algorithms and machine learning techniques to predict future outcomes based on historical data.

- Text Mining: The process of extracting useful information from unstructured te… #

- Text Mining: The process of extracting useful information from unstructured text data, such as emails, social media posts, and documents.

- Data Visualization: The presentation of data in graphical or visual formats to… #

- Data Visualization: The presentation of data in graphical or visual formats to help users understand complex information.

Digital Evidence #

Digital Evidence

Digital evidence refers to any information or data that is stored or transmitted… #

Examples of digital evidence include emails, text messages, social media posts, and computer files.

- Chain of Custody: The chronological documentation of the handling, custody, an… #

- Chain of Custody: The chronological documentation of the handling, custody, and control of evidence from the time it is collected to its presentation in court.

- Metadata: Data that describes other data, providing information about the cont… #

- Metadata: Data that describes other data, providing information about the content, format, and structure of digital files.

- Timestamp: A digital record indicating the date and time when a file was creat… #

- Timestamp: A digital record indicating the date and time when a file was created, modified, or accessed.

Digital Forensics #

Digital Forensics

Digital forensics is the process of collecting, preserving, analyzing, and prese… #

Digital forensics tools and techniques are used to extract information from computers, mobile devices, and other digital storage media.

- Volatile Data: Data that is stored in temporary memory and is lost when a devi… #

- Volatile Data: Data that is stored in temporary memory and is lost when a device is powered off or restarted.

- File Carving: The process of recovering files from fragmented or damaged stora… #

- File Carving: The process of recovering files from fragmented or damaged storage media by identifying file headers and footers.

- Stenography: The practice of concealing messages or information within other f… #

- Stenography: The practice of concealing messages or information within other files or data to avoid detection.

Encryption #

Encryption

Encryption is the process of encoding information in such a way that only author… #

Encryption algorithms use mathematical formulas to convert plaintext data into ciphertext, which can only be decrypted with the correct key.

- Public Key Infrastructure (PKI): A system of digital certificates, public key… #

- Public Key Infrastructure (PKI): A system of digital certificates, public key encryption, and certificate authorities used to secure communications over the internet.

- Symmetric Encryption: A type of encryption where the same key is used for both… #

- Symmetric Encryption: A type of encryption where the same key is used for both encryption and decryption.

- Asymmetric Encryption: A type of encryption where a pair of keys, public and p… #

- Asymmetric Encryption: A type of encryption where a pair of keys, public and private, is used for encryption and decryption.

Internet of Things (IoT) #

Internet of Things (IoT)

The Internet of Things refers to the network of interconnected devices, vehicles… #

In investigations, IoT devices can be used to collect evidence, monitor activities, and track suspects.

- Smart Home: A residential setup where IoT devices such as thermostats, lights,… #

- Smart Home: A residential setup where IoT devices such as thermostats, lights, and security cameras are connected to a central hub for automation and control.

- Wearable Technology: Devices that can be worn on the body, such as smartwatche… #

- Wearable Technology: Devices that can be worn on the body, such as smartwatches and fitness trackers, to collect health and activity data.

- Industrial IoT (IIoT): The use of IoT technology in industrial settings to mon… #

- Industrial IoT (IIoT): The use of IoT technology in industrial settings to monitor equipment, optimize processes, and improve efficiency.

Malware #

Malware

Malware, short for malicious software, is software designed to disrupt, damage,… #

Common types of malware include viruses, worms, Trojans, ransomware, and spyware.

- Botnet: A network of infected computers controlled by a single attacker to car… #

- Botnet: A network of infected computers controlled by a single attacker to carry out malicious activities.

- Rootkit: Software designed to hide the existence of certain processes or progr… #

- Rootkit: Software designed to hide the existence of certain processes or programs on a computer system.

- Adware: Software that displays unwanted advertisements on a user's device, oft… #

- Adware: Software that displays unwanted advertisements on a user's device, often in the form of pop-up windows or banners.

Phishing #

Phishing

Phishing is a type of cyber attack where attackers impersonate legitimate entiti… #

Phishing attacks are often carried out through emails, websites, or text messages.

- Spear Phishing: A targeted phishing attack that is customized for a specific i… #

- Spear Phishing: A targeted phishing attack that is customized for a specific individual or organization.

- Pharming: A type of phishing attack where attackers redirect users to fake web… #

- Pharming: A type of phishing attack where attackers redirect users to fake websites without their knowledge.

- Vishing: A phishing attack conducted over the phone, where attackers try to tr… #

- Vishing: A phishing attack conducted over the phone, where attackers try to trick individuals into revealing sensitive information.

Ransomware #

Ransomware

Ransomware is a type of malware that encrypts a victim's files or locks their de… #

Ransomware attacks can cause significant financial losses and disrupt operations for individuals and organizations.

- Cryptojacking: The unauthorized use of a victim's computer or device to mine c… #

- Cryptojacking: The unauthorized use of a victim's computer or device to mine cryptocurrency without their knowledge.

- Locker Ransomware: A type of ransomware that locks the victim out of their dev… #

- Locker Ransomware: A type of ransomware that locks the victim out of their device, denying access to files and applications.

- DDoS Ransom: A ransom demand made by attackers threatening to carry out a dist… #

- DDoS Ransom: A ransom demand made by attackers threatening to carry out a distributed denial-of-service (DDoS) attack on a victim's network.

Social Engineering #

Social Engineering

Social engineering is a technique used by cybercriminals to manipulate individua… #

Social engineering attacks often exploit human psychology and trust to deceive victims.

- Pretexting: Creating a false pretext or scenario to gain a victim's trust and… #

- Pretexting: Creating a false pretext or scenario to gain a victim's trust and extract sensitive information.

- Phishing: A form of social engineering that uses emails or messages to trick i… #

- Phishing: A form of social engineering that uses emails or messages to trick individuals into revealing personal or financial information.

- Tailgating: Gaining unauthorized access to a restricted area by following an a… #

- Tailgating: Gaining unauthorized access to a restricted area by following an authorized person without proper authentication.

Virtual Private Network (VPN) #

Virtual Private Network (VPN)

A Virtual Private Network is a secure network connection that encrypts data tran… #

VPNs are commonly used to secure remote access to corporate networks, bypass internet censorship, and enhance online security.

- Tunneling: The process of encapsulating and encrypting data packets to create… #

- Tunneling: The process of encapsulating and encrypting data packets to create a secure communication channel over an untrusted network.

- IP Address Masking: Concealing a user's true IP address by routing internet tr… #

- IP Address Masking: Concealing a user's true IP address by routing internet traffic through a VPN server.

- Split Tunneling: A VPN configuration that allows users to route some of their… #

- Split Tunneling: A VPN configuration that allows users to route some of their internet traffic through the VPN while accessing other resources directly.

Wireless Network Security #

Wireless Network Security

Wireless network security refers to the measures taken to protect wireless netwo… #

Common security protocols, encryption methods, and access controls are used to secure wireless networks and ensure data confidentiality and integrity.

- WPA2 (Wi-Fi Protected Access 2): A security protocol used to encrypt data tran… #

- WPA2 (Wi-Fi Protected Access 2): A security protocol used to encrypt data transmitted over Wi-Fi networks and prevent unauthorized access.

- SSID Broadcasting: The process of broadcasting the name of a wireless network… #

- SSID Broadcasting: The process of broadcasting the name of a wireless network to allow devices to discover and connect to it.

- MAC Address Filtering: A security feature that restricts network access based… #

- MAC Address Filtering: A security feature that restricts network access based on the Media Access Control (MAC) address of a device.

Zero #

Day Exploit

A zero #

day exploit is a cyber attack that targets a previously unknown vulnerability in software or hardware before a patch or fix is available. Zero-day exploits are highly sought after by cybercriminals and can cause widespread damage if not mitigated promptly.

- Vulnerability Assessment: The process of identifying, quantifying, and priorit… #

- Vulnerability Assessment: The process of identifying, quantifying, and prioritizing vulnerabilities in a system or network.

- Exploit Kit: A collection of tools and techniques used to exploit vulnerabilit… #

- Exploit Kit: A collection of tools and techniques used to exploit vulnerabilities in software applications.

- Patch Management: The process of applying updates, patches, and fixes to softw… #

- Patch Management: The process of applying updates, patches, and fixes to software or systems to address security vulnerabilities.

Conclusion #

Conclusion

In conclusion, cybercrime and technology play a significant role in modern inves… #

Understanding key concepts such as cybersecurity, digital forensics, encryption, and social engineering is essential for professionals in leadership roles in detective and serious commercial crime investigation. By staying informed about the latest technological trends and threats, investigators can effectively combat cybercrime and protect individuals, businesses, and governments from digital threats.

May 2026 cohort · 29 days left
from £99 GBP
Enrol